Skip to content

Commit

Permalink
Add ngrok token
Browse files Browse the repository at this point in the history
  • Loading branch information
FlyfishSec committed Mar 30, 2021
1 parent f4a9ccb commit 4dc67a8
Show file tree
Hide file tree
Showing 4 changed files with 81 additions and 10 deletions.
8 changes: 3 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@

rsGen v2.0 - Reverse Shell Command Genrator.
rsGen - Reverse Shell Command Genrator.
=

rsGen is an automated reverse shell command genrator, built by Windows Batch and Jscript. The main functions include native command generation and variant command generation. In version 2.0, I added an anonymous reverse shell receiving function "-ngrok" and "-pgrok".
Expand All @@ -22,9 +22,7 @@
-listen Start port listening locally to receive shell that bounce back.Start port listening locally
to receive a shell that bounces back, Function equivalent to the netcat (call powercat.ps1).
-ngrok Start ngrok TCP Tunnel(Contains -pub, -listen options).Notice:I added a ngrok authtoken. Since
it is a free plan, it may not be available to multiple people. You can go to ngrok.com to apply
for your own authtoken, and then modify your authtoken in the include/config.yaml file
-ngrok Start ngrok TCP Tunnel(Contains -pub, -listen options).
-pgrok Start pgrok TCP Tunnel(Contains -pub, -listen options).like ngrok but free and unlimited.
Expand All @@ -34,7 +32,7 @@

## Operating system

A Windows 7 or higher Windows operating system.
Windows 7 or higher Windows operating system.



Expand Down
6 changes: 3 additions & 3 deletions include/ngrok.yml
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
authtoken: 1pqNPomgd8IS4MEVD5ixWqbynci_7qPUV8PQ9bZhDhR23gvBq
web_addr: 44480
region: ap
authtoken: rsgen_ngrok_token
web_addr: 44480
region: ap
58 changes: 58 additions & 0 deletions include/rs_ngrok.token
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
1pqNPomgd8IS4MEVD5ixWqbynci_7qPUV8PQ9bZhDhR23gvBq
5S28rBKgc22ZW7evyedNT_YvEm15RZSHdXgS4QwYbk
9AZ7RJuLDUAqTz8XLZE5_6ts5kTWCvvE5o5BdT5jyE
46BUGD4XhUPTaHq7XJBwv_7e1PZUn5Qm6Z2735i64UN
1hpf39YX2qCXqAkMMcRLC0L4ww9_2VWg1CdHXGjcgnoJH2qEf
6Aw8vTgcG5EvXdQywVvbh_3fMxvd4Q7dcL2caAHAFjV
1UqHsShi6o3ketf426P5UtVdTfs_5XFD6sFRMkryka8fAbLd3
LsVZFxFqgxA4h7ibWV9V_iuA9afbQwaSnGqH9dApL
1hvRf0LvwuAI0SoCfB5J0Cnz02c_qY8Pfk5HRkxqgZ8UFHdg
4rYuvATyw19Cmk3yuxJDe_4SssNTEb27EE1U4es17pJ
1PxZ5EqEBmPYYxU7lbUYCRNdJlg_5DewYd2sVASo8ZdkmAjoU
1PCjTlVFtehbP0GW82CHfXHqps8_QmreDNWDUTwtH2UcD75k
1iabGOYmHBNpWEeQPP8wj780QX8_E8zMR5aYaVB65Mhk5ohA
7uG3wZjvvSXZYMW36LYe3_4hRc6nbzby7aR42FMZuuU
1hdFJmQC6iIak1eSbqx1t7Rrx56_2JLpasDVHybBixWv7Xftm
3F3eLQRVsUG5gqVPTND3A_2vXXtPCjK3TnnEazxHE7a
5ioHp3Qr1ztsMz9adXTH7_5GF6YTpEnczVrjGvmyd6R
1gYNGCw1ZRgzRTMckejZJ68fbOe_3dFZJfLuA8tTseLCmjYWK
3GPmfV8eVwG7Y49T49j2F_5aazjk48owqKA9JJZNs4f
KuTKRosrawrDMAgX1ayq_7AAmsVSom4E6GtT18S1pn
1WRKv6pwjZ0pbjSFpmDVrB3th2d_72o6qVZRRJNHe4UBnLRDM
1iVFNceiOYs6PP0VAIJgdktetio_5qWxix3dLLsdFKptGsQs5
1bIJfpjFHZVpsmpLrsFKd2SjNGr_5RreUAaGcUN97CxwkxEkr
1X7aYWPuFKYzvewLbnNoMo71kZi_2uzbB966Q4TU5cpgNPKhy
7LE18LK8zeaDYeybp5fKP_6GNG1oHEfhTnQE7s9qpw
1Qe1IeySOQWSTnpQ3eFfr8j7Oi5_2zhanqnpZwHBhsfANd6yf
7pWLVhS1gxiMAQdaFeYJy_31krnw9drNLLJftaNSFnm
1XJNNnG8kZsPjjFmLsYNWCC0gIo_7VpBhwTcvhiuK4o2G2jbt
1XzP70k7YVrg7MMaHQWPks0Q8Za_7y6b1mTDJDmJWcuqt5qTp
1Y14GB7E4acXxWYnVTiBejgnLuV_853z7mAgaTJxE9KY3HnCW
1XkoKNLcyiPECcQfGUjrTVzN64P_7tv2YgC4DSnazyVtpCpHm
1Xc7z0uHxDoI9Ah06EQKgH61zoP_6WTPXDGvjFmcp2o7gNmqa
3c4WZaxPbjeRwRibY5opU_2N4TTRKaDubtEWMeKkFXn
3fW4eXHdUN3ziCBXcahZ_3tnDdaTyLw8tKzJtKZkLp
3CqeFZQht43cG5Z2YKfyv_6aKTrgrbo1HtyRi78hRKK
1RCQwctVjSz8AIzHO6S55jm8XB8_5N6PqyZVnoN7mUVqF1yvT
1XTxsRKP8XyxvaJigX9XFXU2FvK_4dqzLxNRJHBz8A3aoPC85
3Y8YSw6bvC9CsbYeRczmt_8akMuLYA3bAUshP1NCMnW
1XSYq8gmxzNgMlYQzERmC50uBot_6qURZnj43KsYF2GWaUamm
6qGnEsrCL4GqZ7hMfqpyz_7ejAThUCjVnU9gD5pbP5u
1Q4i7F6isO7zZRrrjBKZzZhwsMu_74yJqoEs1HrJh1zYyxNo1
1SCsbuawjv9d79jlhlfNljaFTaB_5heVkcR6C7Sk8UBaQ1U1C
1Q45NXgsx6oyusN3GiNAYvkNJPS_AveYUDBcPHsvRvf21WZv
1Q6smHt4Bzz9VEXTwj3a7p5Gdx2_5mp6ivT6N6nB3YmRHUEM3
7VJwGkCTTUubiGhgz6Gv6_5fMLganRSKj9ntdefnF5o
3VnrrXDQVHoNp9HvHFhqX_3X4JExwm6L9n6w4ppL1qy
1ShshNwfhQcyOqlMjnBDVE5X5jC_3WAmzomMHAgkunka4dSck
772yFAui6ynH9AYx29HHS_5Xcr88pHtPTQLwewv7Ctk
5HmAWwzDdkYp8CdzDQMDS_4BGwsK7AdMssLnSttZEeh
1T750atJi3xccndeUqJ4ewiS62o_2s6f8GUccL1qDUXTGSftN
1QUysRUo97w5mdB6sCZvTTMM0aK_3unoMs6nYd7grgCkuhbj3
5eMywZLisJNdybqpFLVgs_4XQDeF3YCMHu1Ybf7mVE6
4Cg1cEwCT7Ek89zT4VcdB_4GPAjMFgu6nhwY7SxQm94
1SGs4s9NrhxP9FRURszjL1nITSv_otcpfpb6aMVEL13u3dv1
1StL3sIccfR624Uc3BGV36XA0qG_6cAMMYFdKtPjtWax3AHSK
1SuK2ukM9Z4NohoJbU9224uMzXr_6h1ABdCrJU2EviZv4RN4r
7ecmt2Kux5uYsTUHrrqGU_3W9CJnaSeSyxiwkjxNhHc
2DXURjrUhAZZNMhqN5m1F_6HHzejcfRecP8upwJnNBd
19 changes: 17 additions & 2 deletions rsGen.bat
Original file line number Diff line number Diff line change
Expand Up @@ -301,9 +301,11 @@ goto :eof
::rs_ngrok
:rs_ngrok_start
if exist "%cd%\include\ngrok.exe" (
taskkill /f /im ngrok.exe >nul 2>nul
call :rs_random_token_start %cd%\include\rs_ngrok.token
echo authtoken: !rs_random_token! >%cd%\include\ngrok.yml
echo web_addr: 44480 >>%cd%\include\ngrok.yml
echo region: ap >>%cd%\include\ngrok.yml
start "Expose a TCP based service running on port !rs_listen_port!" cmd /c %cd%\include\ngrok.exe tcp !rs_listen_port! -config=%cd%\include\ngrok.yml 2>nul

set rs_ngrok=
set rs_n=0
FOR /L %%i in (1,1,30) do (
Expand Down Expand Up @@ -334,6 +336,19 @@ if exist "%cd%\include\ngrok.exe" (
goto :eof
:rs_ngrok_end

::Read random token from text
:rs_random_token_start
set i=0
for /f "tokens=*" %%x in (%1) do (
set line[!i!]=%%x
set /a i += 1
)
set /a j=%random% %% %i%
set rs_random_token=!line[%j%]!
::echo !rs_random_token!
goto :eof
:rs_random_token_end

::rs_pgrok
:rs_pgrok_start
if exist "%cd%\include\pgrok.exe" (
Expand Down

0 comments on commit 4dc67a8

Please sign in to comment.